Asterisk Opus Codec DoS (AST-2016-008)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

A telephony application running on the remote host is affected by a
denial of service vulnerability.

Description :

According to its SIP banner, the version of Asterisk running on the
remote host is 13.12.x prior to 13.13.1 or 14.x prior to 14.2.1. It
is, therefore, affected by a denial of service vulnerability in the
Opus codec when handling SDP offer or answer requests due to improper
parsing of format parameters when they are separated by space
characters. An unauthenticated, remote attacker can exploit this, via
a specially crafted request, to cause the parser to recursively call
itself until it crashes.

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.

See also :

http://downloads.asterisk.org/pub/security/AST-2016-008.html

Solution :

Upgrade to Asterisk version 13.13.1 / 14.2.1 or later.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 95926 ()

Bugtraq ID: 94792

CVE ID: CVE-2016-9937

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now